Analysis
-
max time kernel
148s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-03-2021 18:20
Static task
static1
Behavioral task
behavioral1
Sample
32bd7813_extracted.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
32bd7813_extracted.exe
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
32bd7813_extracted.exe
-
Size
98KB
-
MD5
edc76f55dd524dff091b416acd0f705d
-
SHA1
a668f20f713726cb206a262e6aa4f8d92ea9538a
-
SHA256
e8323188b09701fb4b00e3df10a2dc641cc02b37ddd66466fb69fe05e70550f0
-
SHA512
a7891b60a92ca1ebe15e8fcc35da9524a3dae17eef89fdb781b9e91038b818d620fba65ca35ad9b1569c3149e981f393b8d9c175ffddd57242eb4246b9b8a75c
Score
10/10
Malware Config
Signatures
-
WarzoneRat, AveMaria
WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1832-2-0x0000000075DE1000-0x0000000075DE3000-memory.dmpFilesize
8KB